A bidding protocol for deploying mobile sensors

Guiling Wang, Guohong Cao, T. Laporta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

188 Scopus citations

Abstract

In some harsh environments, manually deploying sensors is impossible. Alternative methods may lead to imprecise placement resulting in coverage holes. To provide the required high coverage in these situations, we propose to deploy sensor networks composed of a mixture of mobile and static sensors in which mobile sensors can move from dense areas to sparse areas to improve the overall coverage. This paper presents a bidding protocol to assist the movement of mobile sensors. In the protocol, static sensors detect coverage holes locally by using Voronoi diagrams, and bid for mobile sensors based on the size of the detected hole. Mobile sensors choose coverage holes to heal based on the bid. Simulation results show that our algorithm provides suitable tradeoff between coverage and sensor cost.

Original languageEnglish (US)
Title of host publicationProceedings - 11th IEEE International Conference on Network Protocols, ICNP 2003
PublisherIEEE Computer Society
Pages315-324
Number of pages10
ISBN (Electronic)0769520243
DOIs
StatePublished - 2003
Externally publishedYes
Event11th IEEE International Conference on Network Protocols, ICNP 2003 - Atlanta, United States
Duration: Nov 4 2003Nov 7 2003

Publication series

NameProceedings - International Conference on Network Protocols, ICNP
Volume2003-January
ISSN (Print)1092-1648

Other

Other11th IEEE International Conference on Network Protocols, ICNP 2003
Country/TerritoryUnited States
CityAtlanta
Period11/4/0311/7/03

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software

Keywords

  • Aircraft manufacture
  • Buildings
  • Chemical sensors
  • Computer science
  • Costs
  • Data structures
  • Network servers
  • Protocols
  • Scattering
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'A bidding protocol for deploying mobile sensors'. Together they form a unique fingerprint.

Cite this